| /OK3568_Linux_fs/kernel/Documentation/userspace-api/ |
| H A D | spec_ctrl.rst | 16 :manpage:`prctl(2)`. 18 There are two prctl options which are related to this: 28 which is selected with arg2 of prctl(2). The return value uses bits 0-3 with 41 subsequent prctl(..., PR_SPEC_ENABLE) will fail. 49 available. If not set, prctl(PR_SET_SPECULATION_CTRL) for the speculation 58 is selected by arg2 of :manpage:`prctl(2)` per task. arg3 is used to hand 67 EINVAL The prctl is not implemented by the architecture or unused 68 prctl(2) arguments are not 0. 95 * prctl(PR_GET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, 0, 0, 0); 96 * prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, PR_SPEC_ENABLE, 0, 0); [all …]
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/seccomp/ |
| H A D | seccomp_bpf.c | 325 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); in TEST() 336 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); in TEST_SIGNAL() 352 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in TEST() 363 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, NULL, 0, 0); in TEST() 367 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, NULL, NULL, NULL); in TEST() 385 ret = prctl(PR_GET_NO_NEW_PRIVS, 0, NULL, 0, 0); in TEST() 390 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST() 420 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in TEST() 427 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST() 434 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST() [all …]
|
| H A D | seccomp_benchmark.c | 161 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in main() 165 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main() 172 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main() 179 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog); in main() 186 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main()
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-kernel/linux-libc-headers/linux-libc-headers_4.4-custom/ |
| H A D | 0006-BACKPORT-arm64-Introduce-prctl-options-to-control-th.patch | 4 Subject: [PATCH] BACKPORT: arm64: Introduce prctl() options to control the 10 the kernel indiscriminately. This patch introduces a prctl() interface 13 testing user-space prctl() return error checking without reconfiguring 36 include/uapi/linux/prctl.h 43 include/uapi/linux/prctl.h | 5 +++++ 46 diff --git a/include/uapi/linux/prctl.h b/include/uapi/linux/prctl.h 48 --- a/include/uapi/linux/prctl.h 49 +++ b/include/uapi/linux/prctl.h
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/prctl/ |
| H A D | disable-tsc-test.c | 49 if ( prctl(PR_GET_TSC, &tsc_val) == -1) in sigsegv_cb() 55 if ( prctl(PR_SET_TSC, PR_TSC_ENABLE) == -1) in sigsegv_cb() 71 if ( prctl(PR_GET_TSC, &tsc_val) == -1) in main() 79 if ( prctl(PR_SET_TSC, PR_TSC_ENABLE) == -1) in main() 86 if ( prctl(PR_SET_TSC, PR_TSC_SIGSEGV) == -1) in main()
|
| H A D | disable-tsc-on-off-stress-test.c | 50 if (prctl(PR_SET_TSC, PR_TSC_ENABLE) < 0) in sigsegv_cb() 72 if (prctl(PR_SET_TSC, PR_TSC_SIGSEGV) < 0) in task()
|
| H A D | disable-tsc-ctxt-sw-stress-test.c | 46 if (prctl(PR_SET_TSC, PR_TSC_SIGSEGV) < 0) in segvtask() 67 if (prctl(PR_SET_TSC, PR_TSC_ENABLE) < 0) in rdtsctask()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/capabilities/ |
| H A D | test_execve.c | 105 if (prctl(PR_SET_KEEPCAPS, 1, 0, 0, 0) != 0) in create_and_enter_ns() 285 …if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != -1 || errno != E… in do_tests() 302 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_RAW, 0, 0, 0) != -1 || errno != EPERM) { in do_tests() 313 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests() 320 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 1) { in do_tests() 325 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_CLEAR_ALL, 0, 0, 0, 0) != 0) in do_tests() 329 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests() 335 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) in do_tests() 343 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests() 363 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) in do_tests()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-devtools/python/ |
| H A D | python3-prctl_1.8.1.bb | 1 SUMMARY = "Control process attributes through prctl" 2 DESCRIPTION = "The linux prctl function allows you to control specific characteristics of a \ 14 SRC_URI = "git://github.com/seveas/python-prctl;protocol=https;branch=main \
|
| /OK3568_Linux_fs/kernel/tools/perf/trace/beauty/ |
| H A D | prctl_option.sh | 8 egrep $regex ${header_dir}/prctl.h | grep -v PR_SET_PTRACER | \ 15 egrep $regex ${header_dir}/prctl.h | \
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/ |
| H A D | Yama.rst | 30 For a solution, some applications use ``prctl(PR_SET_DUMPABLE, ...)`` to 39 ``prctl(PR_SET_PTRACER, pid, ...)`` can be used. An inferior can declare which 45 restrictions, it can call ``prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY, ...)`` 55 ``prctl(PR_SET_DUMPABLE...)`` already). Similarly, ``PTRACE_TRACEME`` is 63 inferior can call ``prctl(PR_SET_PTRACER, debugger, ...)`` to declare
|
| /OK3568_Linux_fs/kernel/Documentation/arm64/ |
| H A D | memory-tagging-extension.rst | 80 ``prctl(PR_SET_TAGGED_ADDR_CTRL, flags, 0, 0, 0)`` system call where ``flags`` 95 ``prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0)`` system call. 121 in the randomly generated set using the ``prctl(PR_SET_TAGGED_ADDR_CTRL, 125 **Note**: The hardware uses an exclude mask but the ``prctl()`` 147 bits in the ``flags`` argument to the ``prctl(PR_SET_TAGGED_ADDR_CTRL, 212 ``prctl()`` options described in 233 #include <sys/prctl.h> 246 * From include/uapi/linux/prctl.h 290 if (prctl(PR_SET_TAGGED_ADDR_CTRL, 294 perror("prctl() failed");
|
| H A D | tagged-address-abi.rst | 69 explicitly enable it via ``prctl()`` as follows: 90 Calling ``prctl(PR_SET_TAGGED_ADDR_CTRL, PR_TAGGED_ADDR_ENABLE, 0, 0, 0)`` 118 - ``prctl()`` other than pointers to user data either passed directly or 138 #include <sys/prctl.h> 152 if (!prctl(PR_SET_TAGGED_ADDR_CTRL, PR_TAGGED_ADDR_ENABLE, 0, 0, 0))
|
| H A D | pointer-authentication.rst | 63 using the PR_PAC_RESET_KEYS prctl. A bitmask of PR_PAC_APIAKEY, 115 The prctl PR_PAC_SET_ENABLED_KEYS allows the user program to control which 118 and PR_PAC_APDBKEY specifying which keys shall be affected by this prctl, 122 prctl(PR_PAC_SET_ENABLED_KEYS, 135 prctl very early after establishing that a process may load legacy binaries,
|
| /OK3568_Linux_fs/kernel/samples/seccomp/ |
| H A D | dropper.c | 45 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) { in install_filter() 49 if (prctl(PR_SET_SECCOMP, 2, &prog)) { in install_filter()
|
| H A D | bpf-fancy.c | 88 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) { in main() 93 if (prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog)) { in main()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/powerpc/pmu/ |
| H A D | per_event_excludes.c | 74 prctl(PR_TASK_PERF_EVENTS_ENABLE); in per_event_excludes() 80 prctl(PR_TASK_PERF_EVENTS_DISABLE); in per_event_excludes()
|
| H A D | count_instructions.c | 35 prctl(PR_TASK_PERF_EVENTS_ENABLE); in do_count_loop() 40 prctl(PR_TASK_PERF_EVENTS_DISABLE); in do_count_loop()
|
| H A D | count_stcx_fail.c | 36 prctl(PR_TASK_PERF_EVENTS_ENABLE); in do_count_loop() 41 prctl(PR_TASK_PERF_EVENTS_DISABLE); in do_count_loop()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/arm64/fp/ |
| H A D | vlset.c | 128 t = prctl(PR_SVE_SET_VL, vl | flags); in main() 135 t = prctl(PR_SVE_GET_VL); in main()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/arm64/mte/ |
| H A D | check_gcr_el1_cswitch.c | 60 if (prctl(PR_SET_TAGGED_ADDR_CTRL, prctl_set, 0, 0, 0)) { in execute_thread() 65 prctl_get = prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0); in execute_thread()
|
| /OK3568_Linux_fs/kernel/tools/perf/tests/ |
| H A D | thread-map.c | 27 !prctl(PR_SET_NAME, NAMEUL, 0, 0, 0)); in test__thread_map() 94 !prctl(PR_SET_NAME, NAMEUL, 0, 0, 0)); in test__thread_map_synthesize()
|
| H A D | keep-tracking.c | 119 CHECK__(prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0)); in test__keep_tracking() 141 CHECK__(prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0)); in test__keep_tracking()
|
| H A D | switch-tracking.c | 486 err = prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0); in test__switch_tracking() 499 err = prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0); in test__switch_tracking() 512 err = prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0); in test__switch_tracking() 525 err = prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0); in test__switch_tracking()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/prog_tests/ |
| H A D | trampoline_count.c | 108 if (CHECK_FAIL(prctl(PR_GET_NAME, comm, 0L, 0L, 0L))) in test_trampoline_count() 111 CHECK_FAIL(prctl(PR_SET_NAME, comm, 0L, 0L, 0L)); in test_trampoline_count()
|